Indicator of Compromise (IoC) Flashcards

1
Q

What are the network-related IoCs?

A
  • malicious domains and/or IP addresses
  • sudden large bandwidth utilization (unusual traffic spikes)
  • beaconing
  • irregular P2P communication
  • activity on unusual ports
  • network scanning and reconnaissance
  • unusual HTTP/DNS/TLS/FTP activity
  • signs of data exfiltration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the host-related IoCs?

A
  • unusually high processor consumption
  • unusually high memory consumption
  • unusually high drive capacity consumption
  • unauthorized software
  • unusual processes with strange names
  • unauthorized changes (configuration)
  • unauthorized privileges
  • abormal OS process behavior
  • file system changes (new directories, modification of current ones)
  • registry changes
  • unauthorized scheduled tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the application-related IoCs?

A
  • unauthorized access
  • unusual network traffic
  • suspicious database queries
  • unauthorized modifications to code
  • unauthorized access to sensitive data
  • unauthorized execution of priviledged actions
  • unauthorized creation of user accounts
  • unexpected application behavior
  • unauthorized use of application resources
  • unauthorized installation of software
  • unauthorized configuration changes
  • unauthorized access to application logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is intelligence?

A

enriching information gathered from outside sources that are associated with the IoCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is intelligence important when dealing with a security incident?

A

gathering already known information about the malware helps organizations to make decisions when handling the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There is a consistent surge in file write operations on your server on a daily basis. What type of attack is likely to blame?

A

Ransomware attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly